• 제목/요약/키워드: Usage Control Model

검색결과 192건 처리시간 0.027초

확장된 사용 제어 모델을 이용한 RFID 접근 제어 (RFID Access Control Using Extended Usage Control Model)

  • 신우철;유상봉
    • 한국전자거래학회지
    • /
    • 제12권4호
    • /
    • pp.127-144
    • /
    • 2007
  • 본 논문에서는 RFID 미들웨어와 이에 연결된 정보 서비스(Information Service), 네임 서비스(Object Name Service), 상위 애플리케이션을 위한 웹 서비스 등을 통합적으로 관리하기 위한 보안 관리기를 기술한다. 또한 분산된 RFID 시스템의 개체에 대한 접근제어를 확립하기 위해 기존의 사용 제어 모델과 SAML의 assertion을 확장하여 싱글사인온(Single-Sign On)을 구현하였다. 본 논문에서 제시한 RFID 보안 기술은 미들웨어에 포함되어 RFID 정보보호에 기여하고 향후 유비쿼터스 센서 네트워크 분야에서도 동일하게 적용될 수 있을 것이다.

  • PDF

휴대 단말기를 위한 상황인식 기반 사용제어 모델 (A Usage Control Model based on Context-Awareness for Mobile Devices)

  • 장혜영;노진욱;조성제
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권1호
    • /
    • pp.63-70
    • /
    • 2008
  • 휴대폰 사용이 대중화됨에 따라 사람들이 때와 장소를 가지리 않고 휴대폰을 무분별하게 사용함으로써 나타나는 폐해가 심각하다. 특히, 휴대폰 사용이 병원의 전자 의료기기나 항공기 이착륙 시스템 등에 나쁜 영향을 끼친다는 연구 결과들이 발표되고 있다. 본 논문에서는 모바일 기기에 적용할 수 있는 상황인식 기반의 사용제어 모델을 제안한다. 즉, 위치와 시간, 주변소음 등의 상황정보에 따라 휴대폰 자체 및 모바일 콘텐츠의 사용을 제어하는 모델에 대해 연구하였다. 제안한 사용제어 모델은 '동적인 역할기반 접근제어' (Dynamic Role-based Access Control)을 포함한다. 제안한 시스템의 효용성을 확인하기 위해, PC 서버 및 임베디드 보드 상에 프로토타입 시스템을 구현하여 그 성능을 평가하였다.

The Effects of Training for Computer Skills on Outcome Expectations , Ease of Use , Self-Efficacy and Perceived Behavioral Control

  • Lee, Min-Hwa
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 1996년도 추계 학술 발표회 발표논문집
    • /
    • pp.29-48
    • /
    • 1996
  • Previous studies on user training have largely focused on assessing models which describe the determinants of information technology usage or examined theeffects of training, on user satisfaction, productivity, performance and so on. Scant research efforts have been made, however, to examine those effects of training by using theoretical models. This study presented a conceptural model to predict intention to use information technology and conducted an experimentto understand how training for computer skill acquisition affects primary variables of the model. The data were obtained from 32 student subjects of an experimental group and 31 students of a control group, and the information technology employed for this study was a university's electronic mail system. The study results revealed that attitude toward usage and perceived behavioral control helped to predict user intentions ; outcome expectations were positively related to attitude toward usage ; and self-efficacy was positively related to perceived behavioral control. Thd hands-on training for the experimental group led to increases in perceived ease of use, self-efficacy and perceived behaviroal control. The changes in those variables suggest more causal effects of user training than other survey studies.

ATM망에서 사용자 변수 제어에 의한 감시 성능 개선에 관한 연구 (A study on improvement of policing perfomance by usage parameter control in asynchronous transfer mode networks)

  • 한길성;오창석
    • 한국통신학회논문지
    • /
    • 제21권6호
    • /
    • pp.1480-1489
    • /
    • 1996
  • In ATM networks there are two methods in traffic control as schemes advancing the quality of service. One is reactive control after congestion and the other which is generally recommended, is preventive control before congestion, including connection admission control on call leel and usage parameter control, network parameter control, priority control and congestion control on cell level. In particular, usage parameter control is required for restricting the peak cell rate of bursy tracffic to the parameter negotiated at call set-up phase since the peak cell rate significantly influences the network quality of service. The scheme for progressing quality of service by usage parameter control is themethod using VSA(Virtual Scheduling Algorlithm) recommended ITU-T. The method using VSSA(Virtual Scheduling Suggested Algorlithm) in this paper is suggested by considering cell delay variation and token rate of leaky bucket, compared VSA and VSANT(Virtual Scheduling Algolithm with No Tolerance) with VSSA which polices violated cell probability of conformed peak cell rate and intentionally excessive peak cell rate. VSSA method using IPP(Interruped Poisson Process) model of input traffic source showed more quality of service than VSA and VSANT methods as usage parameter control because the suggested method reduced the violated cell probability of contformed peak cell rate and intentionally excessive peak cell rate.

  • PDF

The Effects of Training for Computer Skills on Outcome Expectations, Ease of Use, Self-Efficacy and Perceived Behavioral Control

  • Lee, Min-Hwa
    • 한국정보시스템학회:학술대회논문집
    • /
    • 한국정보시스템학회 1996년도 추계학술발표회 발표논문집
    • /
    • pp.29-48
    • /
    • 1996
  • Previous studies on user training have largely focused on assessing models which describe the determinants of information technology usage or examined the effects of training on user satisfaction, productivity, performance, and so on. Scant research efforts have been made, however, to examine those effects of training by using theoretical models. This study presented a conceptual model to predict intention to use information technology and conducted an experiment to understand how training for computer skill acquisition affects primary variables of the model. The data were obtained from 32 student subjects of an experimental group and 31 students of a control group, and the information technology employed for this study was a university's electronic mail system. The study results revealed that attitude toward usage and perceived behavioral control helped to predict user intentions; outcome expectations were positively related to attitude toward usage; and self - efficacy and perceived behavioral control. The changes in those variables suggest more causal effects of user training than other survey studies.

  • PDF

계획된 행동이론을 적용한 명품 복제품의 사용과 재구매 행동에 관한 연구 (Consumption of Counterfeit Luxury Fashion Products Based on the Theory of Planned Behavior)

  • 장재임;추호정
    • 한국의류학회지
    • /
    • 제39권3호
    • /
    • pp.433-445
    • /
    • 2015
  • This study examines factors that influence consumer behavior regarding the usage intentions and repurchasing behavior of counterfeits. Based on the Theory of Planned Behavior by Ajzen (1991), this study looks at the impact of attitude, subjective norm, perceived behavioral control, as well as the moral norm of consumers about intentions to use and repurchase counterfeits. An online survey was conducted on males and females over the age of 20 with previous experiences of purchasing counterfeits; subsequently, 209 responses were collected and analyzed. The covariance structure model was used to analyze the data in order to measure the factors that influence the usage of counterfeits and repurchasing behavior. The results show that attitude, subjective norm, and perceived behavioral control have significantly positive effects on usage intentions, while moral norm has a significantly negative effect on usage intentions. Usage intentions also have a significantly positive effect on repurchasing behavior and confirmed that usage intentions functions as the mediator. The variables that influence usage intentions are attitude, perceived behavioral control, moral norm, and subjective norm, in descending order. Consumer attitudes towards counterfeits is a major factor that influences usage intentions. Therefore, ethical problems should be emphasized to encourage a negative attitude towards counterfeits. This study identifies an important aspect to show that usage intentions toward counterfeits, and not purchasing intentions, influences repurchasing behavior. Findings are significant in that they reveal the role of the moral norm variable added to the TPB model.

On-line 학습을 통한 ATM 호레벨 트래픽 제어 연구 (A Study on the Traffic Controller of ATM Call Level Based on On-line Learning)

  • 서현승;백종일;김영철
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 하계종합학술대회 논문집(1)
    • /
    • pp.115-118
    • /
    • 2000
  • In order to control the flow of traffics in ATM networks and optimize the usage of network resources, an efficient control mechanism is necessary to cope with congestion and prevent the degradation of network performance caused by congestion. To effectively control traffic in UNI(User Network Interface) stage, we proposed algorithm of integrated model using on-line teaming neural network for CAC(Call Admission Control) and UPC(Usage Parameter Control). Simulation results will show that the proposed adaptive algorithm uses of network resources efficiently and satisfies QoS for the various kinds of traffics.

  • PDF

The Effects of Training for Computer Skills on Outcome Expectations, Ease of Use, Self-Efficacy and Perceived Behavioral Control

  • Lee, Min-Hwa
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제5권
    • /
    • pp.345-371
    • /
    • 1996
  • Previous studies on user training have largely focused on assessing models which describe the determinants of information technology usage or examined the effects of training on user satisfaction, productivity, performance, and so on. Scant research efforts have been made, however, to examine those effects of training by using theoretical models. This study presented a conceptual models to predict intention to use information technology and conducted an experiment to understand how training for computer skill acquisition affects primary variables of the model. The data were obtained from 32 student subjects of an experimental group and 31 students of a control group, and the information technology employed for this study was a university electronic mail system. The study results revealed that attitude toward usage and perceived behavioral control helped to predict user intentions ;; outcome expectations were positively related to attitude toward usage ; and self-efficacy was positively related to perceived behavioral control. The hands-on training for the experimental group led to increases in perceived ease of use, self-efficacy and perceived behavioral control. The changes in those variables suggest more causal effects of user training than other survey studies.

  • PDF

프라이버시 보호를 갖는 확장된 역할기반 접근제어 모델 (An Extended Role-based Access Control Model with Privacy Enforcement)

  • 박종화;김동규
    • 한국통신학회논문지
    • /
    • 제29권8C호
    • /
    • pp.1076-1085
    • /
    • 2004
  • 최근 프라이버시 적용이 IT분야의 가장 중요한 문제의 하나로 대두되고 있다. 프라이버시 보호는 조직의 데이터 처리 시스템에 프라이버시 정책을 적용함으로써 달성 될 수 있다. 전통적인 보안 모델은 다소간 프라이버시 바인딩과 같은 기본적인 프라이버시 요구를 적용하기에 부적절하다. 본 논문은 조직에 프라이버시 정책을 적용할 수 있는 하나의 확장된 역할기반 접근제어 모델을 제안한다. 이 모델은 RBAC과 도메인-타입 적용, 그리고 프라이버시 정책을 결합함으로써 프라이버시 보호와 함께 문맥기반 접근제어를 제공한다. 프라이버시 정책은 역할에 프라이버시 등급을, 데이터에 고객의 프라이버시 선호에 따른 데이터 프라이버시 등급을 부여하는 데이터 사용 정책을 적용함으로써 달성한다. 또 이 모델을 응용에 적용하기 위하여 작은 병원 모델이 사용되었다.

셀손실 우선순위 기반의 사용 변수제어의 VLSI 구현 (VLSI implementation of Usage Parameter Control Based on Cell Loss Priority)

  • 권재우;조태경;최명렬
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(2)
    • /
    • pp.196-199
    • /
    • 2000
  • In this paper has studied an enhanced usage parameter control algorithm, which is one of the preventive traffic control method in ATM networks. The proposed algorithm is based on the CLP(Cell Loss Priority) bit in the ATM cell header. This algorithm can eliminate the measurement phasing problem in cell conformance testing in ATM networks. The proposed algorithm can minimize the cell loss ratio of high priority cell(CLP = 0) and resolve the burstiness of eel]s which may be generated in the multiplexing and demultiplexing procedure. For the performance evaluation, we have simulated the proposed algorithm with discrete time input traffic model and the results show that the performance of the proposed algorithm is better than that of ITU-T usage parameter control algorithm.

  • PDF